laptop with lock on it

Two-Factor Authentication: A Resolution That Works

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, Security Policy and Procedure Development, Theft, Embezzlement, and Fraud

Many people ring in the New Year with celebrations and hopes of a better year. The New Year symbolizes the ending of one year and the beginning of another even better year. Some offer advice to bring happiness and prosperity to others: Eat twelve grapes at midnight or eat black-eyed peas on January 1. My advice is more concrete and …

Integrated Security Program at Institute of Management Accountants

Protus3 News, Security Planning, Security Program Development

Chris Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the Institute of Management Accountants. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, while integrating and operating a security program …

Protos3 logo

Protus3 Awarded Security Consulting Project for OhioHealth

Protus3 News, Security Assessment, Security Master Planning, Security Program Development

Protus3 will provide security consulting services for OhioHealth. Protus3 will assist with facility and operational physical security improvements.  First, Protus3 will meet with key personnel and conduct observations of operations and procedures. The project will also include a limited review and assessment of the existing physical security features. Protus3 will also review the current level of facility “hardening”.  Using the …

Christine Peterson

Chris Peterson Presents “Integrated Security” at Rotary Club of Crabtree

Protus3 News, Security Program Development

Chris Peterson presented “What is Integrated Security and Why Does it Matter to You?” at the Rotary Club of Crabtree. An integrated security program operates best when the business and security processes work together in harmony. Starting from the ground up, this presentation addresses creating a solid foundation that facilitates your company’s mission, while integrating and operating a security program …

Campus Safety Article

Campus Security: Parents So Concerned They Are Willing to Pay for It Themselves

Christine L. Peterson, CPP, ISP News, Security Program Development, Workplace Violence

Campus security and safety of students, faculty, staff and infrastructure should be a foregone conclusion. Unfortunately, it is not. Campus Safety recently published an article entitled Parents So Concerned about School Safety They Are Willing to Pay for It Themselves. You can read the entire article here. Active Shooter Events Time and again we are horrified by active shooter events targeting …

HPG Employee Theft Article

From HPG – Guard against Losses from Employee Theft

Tasha D. Dyson Compliance, Embezzlement, Fraud, Security Program Development, Theft, Theft, Embezzlement, and Fraud

Employee theft costs companies billions of dollars a year. This poses a very serious threat to profitability if left unchecked. Therefore, every business needs to set up some internal controls to thwart this type of fraud. This article from Hughes Pittman & Gupton, LLP entitled “Guard against Losses from Employee Theft” looks at a few simple steps to take that …

FBI logo

FBI Tech Tuesday: Building a Digital Defense Against Travel Scams

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Electronic Data Recovery, Mobile Forensics, News, Security Program Development, Training

The FBI is tasked with investigating many categories of crimes including travel scams. As a result, they receive many tips that can be beneficial to the public when passed along. I can say with experience that the FBI has increased the process of alerting and educating the public about certain security and safety issues. This is most evident as it …

US-CERT

Back-to-School Cyber Safety

Russell W. Gilmore, CISSP, CISM, EnCE Computer Forensics, Mobile Forensics, News, Security Program Development

It is that time of year again for many parents to think about cyber safety for their children. We are sending our children back to school. They have their phones, tablets and computers and are ready to start a new year. This is the perfect time to think about their cyber safety. One such safety category is keeping your children …

infosecurity article 2018-08

PGA Hack

Russell W. Gilmore, CISSP, CISM, EnCE Mobile Forensics, News, Security Program Development

It appears the PGA was hacked and fell victim to a ransomware attack. According to some reports, attackers used BitPaymer Ransomeware. This allows attackers to hack into remote desktop services connected to the internet. If I have said it once I have said it a hundred times: Do not allow Remote Desktop Services to connect into your network from the …

three people texting

Benefits and Disadvantages of BYOD

Russell W. Gilmore, CISSP, CISM, EnCE Compliance, Computer Forensics, Mobile Forensics, Security Policy and Procedure Development

With BYOD, a single individual has the capacity to affect himself, those close to him, the company, and potentially millions of other people. One unsecured device can harm millions of individuals and organizations who may become unsuspecting and unwilling participants. These “collateral damage” participants often have no say in how these risks are managed. Read more about the BYOD Wild …